CN102882780B - Looped network tunnel configuration method based on overlapping trees, ring network protection method and system - Google Patents

Looped network tunnel configuration method based on overlapping trees, ring network protection method and system Download PDF

Info

Publication number
CN102882780B
CN102882780B CN201110198332.1A CN201110198332A CN102882780B CN 102882780 B CN102882780 B CN 102882780B CN 201110198332 A CN201110198332 A CN 201110198332A CN 102882780 B CN102882780 B CN 102882780B
Authority
CN
China
Prior art keywords
tunnel
node
business
state
ring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110198332.1A
Other languages
Chinese (zh)
Other versions
CN102882780A (en
Inventor
陈杰
刘国满
曲延锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yancheng Hengmao Landscaping Co.,Ltd.
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110198332.1A priority Critical patent/CN102882780B/en
Priority to PCT/CN2012/077223 priority patent/WO2013010422A1/en
Publication of CN102882780A publication Critical patent/CN102882780A/en
Application granted granted Critical
Publication of CN102882780B publication Critical patent/CN102882780B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a kind of looped network tunnel configuration method based on overlapping trees, ring network protection method and system; on ring, for the purpose of the lower link point of business, node configures work tunnel based on overlapping trees, and reversely closed protective tunnel corresponding with work tunnel.The present invention is by setting up multiple MP2P overlapping trees on a ring; one or more nodes from ring can be carried on each overlapping trees enter ring and go out the business of ring to same node; avoid the complexity of looped network tunnel configuration, improve the performance of protection switching, distribute rationally.

Description

Looped network tunnel configuration method based on overlapping trees, ring network protection method and system
Technical field
The present invention relates to looped network protection technical field, particularly relate to a kind of looped network tunnel configuration side based on overlapping trees Method, ring network protection method and system.
Background technology
Current in looped network, for Wrapping(loopback in G.8132 standard) protection scheme, owing to this protection scheme is Each protected LSP(Label Switching Path, label switched path) a corresponding closed protective ring, it configures work Measuring too big, switching action is the most, switches the process time the most long.
Summary of the invention
Present invention solves the technical problem that and be to provide a kind of looped network tunnel configuration method based on overlapping trees, looped network protection Method and system, optimize looped network configuration, improve the performance of protection switching.
For solving above-mentioned technical problem, the invention provides a kind of looped network tunnel configuration method based on overlapping trees, with On ring, for the purpose of the lower link point of business, node configures work tunnel based on overlapping trees, and corresponding to described work tunnel Reverse closed protective tunnel.
Further, the overlapping trees of the net loaded multiple multipoint-to-points of a physical rings (MP2P), described overlapping trees holds Carry from described ring one or more nodes to the business of same destination node.
Further, described configuration work tunnel and closed protective tunnel, specifically refer to:
Along the clockwise of described ring and/or counterclockwise from the adjacent node of described lower link point to described lower link Point, sets up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point Road.
Additionally, present invention also offers a kind of ring net protection method based on overlapping trees, described method includes:
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with described work Make reverse closed protective tunnel accordingly, tunnel;
Link State between each nodal test and adjacent node on ring, when detecting that Link State changes, sends state Change notification packet to other nodes on ring;
When described Link State changes into link or one malfunctions, fault phase neighbors will transmit in work tunnel The business being sent to trouble point be switched on corresponding closed protective tunnel, by closed protective tunnel transmit be sent to trouble point Business be switched in corresponding work tunnel;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
Further, described method also includes:
When described Link State changes into link or node failure disappears, fault phase neighbors will be switched to described closing The business transmitted on protection tunnel is restored in described work tunnel.
Further, described method also includes:
When described Link State changes into link or one malfunctions, the state of this node is changed by fault phase neighbors Becoming switching (Switch) state, the state of this node is changed into break-through (Pass by the node outside fault phase neighbors Through) state;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by Switch state changes into free time (Idle) state;Node outside fault phase neighbors by the state of this node by Pass through State changes into Idle state.
Further, described method also includes:
Service message uses press-in (PUSH) looped network tunnel label stacked manner when upper ring forwards, i.e. under described The tunnel label of traffic direction press-in (PUSH) overlapping trees of link point and work tunnel, forwards along looped network, described Lower link point ejects (POP) tunnel label and carries out ring under business.
Further, the overlapping trees of the net loaded multiple multipoint-to-points of a physical rings (MP2P), described overlapping trees holds Carry from described ring one or more nodes to the business of same destination node;
Wherein, the business of described overlapping trees carrying, including: VPN (virtual private network) (VPN) business of single layer label, multilamellar Label switched path (LSP) business of label, without the IP of label or Ethernet (Eth) business.
Further, described work tunnel supports that (PHP) is ejected in the last two jump.
Present invention also offers a kind of looped network tunnel configuration system based on overlapping trees, including: path configuration module,
Described path configuration module is used for, and on ring, for the purpose of the lower link point of business, node configuration is based on overlapping trees Work tunnel, and reversely closed protective tunnel corresponding with described work tunnel.
Further, described path configuration module is used for, along the clockwise of described ring and/or counterclockwise from described The adjacent node of lower link point, to described node, sets up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point Road.
Present invention also offers a kind of Ring protection system based on overlapping trees, described system includes:
Path configuration module, for node configuration work based on overlapping trees for the purpose of the lower link point of business on ring Tunnel, and reversely closed protective tunnel corresponding with described work tunnel;
State detection module, for detecting the Link State between this node and adjacent node;
State advertisement module, the Link State between detection and adjacent node, when detecting that Link State changes, send out State is sent to change notification packet to other nodes on ring;
Business handover module, for changing notification packet according to the described state received, when knowing described Link State Changing into normal condition when becoming link or one malfunctions, fault phase neighbors is sent to fault by transmit in work tunnel The business of point is switched on corresponding closed protective tunnel, the business switching being sent to trouble point that will transmit on closed protective tunnel In corresponding work tunnel;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
Further, described business handover module is additionally operable to, and changes notification packet according to the described state received, when obtaining Know that when described Link State changes into link or node failure disappearance, then fault phase neighbors will be switched to described closed protective tunnel The business transmitted on road is restored in described work tunnel.
Further, described business handover module is additionally operable to, when described Link State changes into link or node appearance event During barrier, the state of this node is changed into Switch state by fault phase neighbors, and the node outside fault phase neighbors is by this node State change into Pass through state;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by Switch state changes into Idle state;The state of this node is changed by the node outside fault phase neighbors by Pass through state For Idle state.
The present invention proposes a kind of new WRAPPING looped network protection scheme, can be applicable to MPLS/MPLS-TP looped network, passes through A ring is set up the overlapping trees of multiple multipoint-to-point (MP2P), each overlapping trees can carry from ring one or Multiple nodes enter ring and go out the business of ring to same node, compared with prior art, it is to avoid the complexity of looped network tunnel configuration, carry The high performance of protection switching, distributes rationally.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this Bright schematic description and description is used for explaining the present invention, is not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the loop network topology structure schematic diagram according to prior art;
Fig. 2 is the comprising modules schematic diagram of the Ring protection system of the embodiment of the present invention;
Fig. 3 is the malfunction protection schematic diagram of the embodiment of the present invention;
Fig. 4 is the failure vanishes switching schematic diagram of the embodiment of the present invention;
Fig. 5 is the looped network protection process flow schematic diagram of the embodiment of the present invention.
Detailed description of the invention
Present embodiments provide for a kind of looped network tunnel configuration method based on overlapping trees, adopt the following technical scheme that
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with this work Reverse closed protective tunnel accordingly, tunnel.
Wherein, the overlapping trees of the net loaded multiple multipoint-to-points of a physical rings (MP2P), described overlapping trees carrying From described ring, one or more nodes are to the business of same destination node.
Further, configuration work tunnel and closed protective tunnel, specifically refer to:
Along the clockwise of described ring and/or counterclockwise from the adjacent node of described lower link point to described lower link Point, sets up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point Road.
Based on above-mentioned looped network tunnel configuration method, present embodiments provide for a kind of looped network protection based on overlapping trees Method, adopts the following technical scheme that
Step one, for the lower link point of ring operational line, node configuration work tunnel for the purpose of each lower link point With closed protective tunnel.
Specifically, if being made up of n node on ring, then to each lower link point first along the clockwise of ring or inverse time Pin direction is from the work tunnel (being equal to path) of the adjacent node of this node to this node, meanwhile, along the phase of work tunnel Opposite direction sets up a protection tunnel closed, and needs to set up 2N work tunnel the most altogether and 2N protects tunnel.
Step 2, on ring, (i.e. on ring, each node detects and the Link State of two adjacent sections point every section of link respectively, including chain Whether road or node break down) all startup separator detections, when nodal test a certain on ring to Link State or peer node State is when normal condition becomes malfunction, along the direction away from fault of ring, sends state to other nodes and changes logical Accuse message.
Step 3, after on ring, other nodes receive this state change notification packet, if fault phase neighbors, then The business being sent to trouble point that will be transmitted in work tunnel, including: the VPN(Virtual Private of single layer label Network, VPN (virtual private network)) business, the LSP service of multilayer labels, IP or Eth(Ethernet without label) business, switching On corresponding closed protective tunnel, and the business being sent to trouble point transmitted on closed protective tunnel is switched to corresponding work Make on tunnel;On ring, other nodes then carry out the transparent transmission of business.
Step 4, when the state of nodal test a certain on ring to Link State or peer node becomes normal from malfunction During state, the direction away from original fault along ring sends state to other nodes and changes notification packet, and fault adjacent segments Point detects failure vanishes on ring or receives the state that malfunction disappears when changing notification packet, then will be from this node The business recovery sent on closed protective tunnel or receive sends or receives in work tunnel.
Step 5, after node on the ring receives this message notice becoming normal condition from malfunction, then all on ring Node all becomes Idle state;And for fault phase neighbors, then the business that protection tunnel transmits is switched to work again Transmit on tunnel, prevent the loss of data.
Step 6, when the business entering ring transmits in work tunnel, when being sent in work tunnel reciprocal the in business During two jumpings, outer layer tunnel label can be ejected (PHP), what the business transmitted directly was sent to business goes out link point, continues Resume and send.
Additionally, while above-mentioned steps three, also include following process step: when node on the ring detects fault or reception When on ring, other nodes are sent to the state change notification packet of this node, if fault phase neighbors, then from Idle state Switch to Switch(switch) state;For other nodes on ring (healthy phases neighbors), receive this state and change notice report Wen Hou, then idle by Idle() state becomes Pass through(break-through) state.
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the present invention Embodiment be described in detail.It should be noted that in the case of not conflicting, in embodiment in the application and embodiment Feature can mutual combination in any.
Embodiment one
Present embodiments providing a kind of looped network tunnel configuration system based on overlapping trees, this system mainly includes that path is joined Putting module, this path configuration module is used for: on ring, for the purpose of the lower link point of business, node configures work based on overlapping trees Make tunnel, and reversely closed protective tunnel corresponding with work tunnel.
Further, above-mentioned path configuration module is used for: along the clockwise of described ring and/or counterclockwise from institute State the adjacent node of lower link point to described node, set up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point Road.
Embodiment two
As in figure 2 it is shown, the Ring protection system that the present embodiment provides mainly includes following four module: path configures mould Block, state detection module, state advertisement module and business handover module.Wherein, the major function of each module is described as follows:
Path configuration module, is mainly used on ring node for the purpose of each lower link point of business, configures one from phase Neighbors along ring clockwise or counterclockwise to the work tunnel on this lower link point, it addition, join for this work tunnel Put the protection tunnel (hereinafter referred to as closed protective tunnel) of a closed-loop in opposite direction, this work tunnel is protected Protect.
State detection module, is mainly used in being joined directly together the event of link layer between the adjacent node connect by looped network two Barrier detection messages, detects the state of this section of link.
Such as, by detection CC&CV(Continuity Check and Connectivity Verification, even Continuous property detection and connective confirmation) BFD(Bidirectional Forwarding Detection, two-way converting detects) message Deng, detect Link State.
State advertisement module, this module is mainly used in (wrapping when Link State changes when state detection module detects Include link or node failure), then produce a state and change notification packet, on ring, the direction away from fault is sent on ring Node, until to the downstream node of fault;
Wherein, state changes notification packet, includes but not limited to: R-APS(Ring-Automatic Protection Switching, looped network automatic protection switching) message etc..
For basis, business handover module, detects that Link State changes or receives other nodes and sends over State change notification packet (such as R-APS etc.) after, carry out the protection switching of business, specifically include:
Notification packet is changed, when knowing that Link State is changed into normal condition and become link or joint according to the state received When point breaks down, the business being sent to trouble point that work tunnel transmits is switched to close accordingly guarantor by fault phase neighbors Protect on tunnel, the business being sent to trouble point that closed protective tunnel transmits is switched in corresponding work tunnel;Fault phase Node outside neighbors carries out transparent transmission to the business transmitted;
Notification packet is changed, when knowing that Link State changes into link or node failure disappears according to the state received Time, then the business being switched on described closed protective tunnel transmit is restored to described work tunnel by fault phase neighbors On.
Additionally, business handover module is additionally operable to carry out the change of state on this node, for fault phase neighbors, by Idle state becomes Switch state or is become Idle state by Swtich state;And for nonneighbor node in fault, then by Idle state becomes pass through state or is become idle state by pass through state.
Specifically, when Link State changes into link or one malfunctions, fault phase neighbors is by the shape of this node State changes into Switch state, and the state of this node is changed into Pass through state by the node outside fault phase neighbors;
When Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by Switch state changes into Idle state;The state of this node is changed by the node outside fault phase neighbors by Pass through state For Idle state.
As a example by fault below in conjunction with network shown in Fig. 3 and Fig. 4, the specific implementation process of looped network protection of the present invention is made Further describe in detail.
It should be noted that the business of the overlapping trees carrying of the present invention can be the vpn service (L2/L3 of single layer label VPN), it is also possible to be the LSP service (IP-MPLS/MPLS-TP Tunnel etc.) of multilayer labels, even without label IP or Eth business.
For looped network business, its main process realizing looped network protection is described as follows:
Step 1, configuration work tunnel and closed protective tunnel;
For D point in the network shown in Fig. 3, if its work tunnel is configured to its counterclockwise (C-B-A-F- E-D), its corresponding protection tunnel is D-E-F-A-B-C-D closed-loop.Or, it is also possible to work tunnel is configured to up time Pin direction (E-F-A-B-C-D), the protection tunnel of its correspondence is D-C-B-A-F-E-D.
Step 2, if by business 1(LSP business or IP operation or PW business) and business 2(LSP business, IP operation or PW Business) enter ring from node on the ring A and B respectively, then on ring under non-failure conditions, business 1 and business 2 are respectively at A and B point Upper press-in (PUSH) transmits to C-B-A-F-E-D in same work tunnel, and after its encapsulation, the form of message is as shown in table 1 below.
Table 1 message encapsulation format
Wherein, Tunnel Label: represent outer layer forward-path label;
LSP Label: representing and entering on ring, this business is LSP service, then entering on link point, carrying out LSP label friendship After changing (swap), then it is pressed into outer layer tunnel Tunnel Label, outer layer tunnel transmits;
IP Header: represent that being directly accessed into is IP operation when entering on link point, then directly IP operation is pressed into Outer layer tunnel Tunnel Label, transmits in outer layer tunnel;
PW Label: represent entering on link point, being accessed is the business (such as: ATM, ETH, TDM etc.) of pseudo wire emulation, Then originally entering after link point carries out local service process (NSP), after stamping corresponding PW Label, then be pressed into outer layer tunnel Tunnel Label, transmits in outer layer tunnel;
PDU: refer to the content of the concrete packaged business in the inside.
Exchange (swap) operation of outer layer tunnel label is only carried out in node on the ring, and outside it goes out and ejects on link point D After layer label 300, directly business 1 and business 2 business to the inside carry out corresponding process;If for LSP service, the most first bullet Go out (POP) outer layer Tunnel label, then carry out going out ring after the inside LSP Label exchanges (Swap);If for IP operation, bullet After going out (POP) outer layer Tunnel Label, directly according to information on IP Header packet header, the inside, carry out ring and process;If PW For business, the most first eject after (POP) outer layer Tunnel Label, then after ejecting (POP) PW Label, enter according to PW Label The encapsulation of row artificial service etc. process, then go out ring operation.
Step 3, when node on the ring E or F detect link or node failure (malfunctioning node E or F), then by this work tunnel The business (such as business 1, business 2 etc.) of all transmission on road is switched to protect the upper transmission in tunnel (D-E-F-A-B-C-D);And will Generation state change notification packet (such as R-APS etc.) is sent on ring other nodes along the direction away from fault of ring.
Step 4, when on ring, other nodes receive state change notification packet, for healthy phases neighbors, Then it is become pass through state from IDLE state;Then from idle state, Switching is become for fault peer node State.
So, business 1 and business 2 business enter ring from node A and B, are first pressed into work tunnel C-B-A-F-E-D and pass Send;When being sent on node F, then it is switched to protect on tunnel, original working tunnel label 100 is exchanged (Swap) to protection Tunnel label 101, press-in protection tunnel F-A-B-C-D-E, after being sent to node E, protection tunnel label 301 is exchanged into again work Make tunnel label 300, be again pressed into work tunnel transmission, until it reaches its ring egress D, eject outer operative tunnel label After 300, directly the business 1 of the inside and business 2 business etc. are processed.
Step 5, when failure vanishes on ring, as shown in Figure 4, between F and E, link failure disappears, when node F or E detects During to failure vanishes, then F or E becomes Idle from Switching state, and will weigh again on D-E-F-A-B-C-D on protection tunnel Newly return to C-B-A-F-E-D in work tunnel transmit;Meanwhile, node E or F that the state that detects changes, will additionally generate one The state of failure vanishes changes notification packet, away from the direction of fault on ring, is sent on ring other nodes.
Step 6, when on ring, other nodes receive the state change notification packet of this failure vanishes, then by original Switching and Pass Through state changes over Idle state;And also will originally protect tunnel to upload on E or F node Send and transmit on business switch operating tunnel the most again.
Step 7, and for business 1 and business 2, it is pressed into its work tunnel C-B-A-F-E-D again, it is sent to it After going out link point D, after ejecting outer operative tunnel label 300, business 1 and business 2 business further according to the inside process.
Fig. 5 shows the handling process of the ring net protection method of the embodiment of the present invention, as it is shown in figure 5, this flow process includes:
Step 101, on ring, for the purpose of the lower link point (also referred to as egress) of business, node configures work tunnel and envelope Close protection tunnel.
Step 102, every section of link periodically sends fault detect message.
Step 103, it may be judged whether detect that Link State changes, if it is, perform step 104, otherwise, performs step 105。
Step 104, the state that is immediately generated changes notification packet, is sent on ring other nodes.
Step 105, periodically sends state advertisement message.
Step 106, node on the ring detects or receives other states and changes notification packet.
Step 107, it is judged that Link State changes whether become malfunction from normal condition, if it is, perform step 108, otherwise, perform step 109.
Step 108, each node is set to Switching or Pass through state, and performs step 110.
Step 109, each node is set to Idle state.
Step 110, carries out business and transmits the switching in tunnel.
These are only that the present invention's is preferable to carry out case, be not limited to the present invention, the present invention also can have other Various embodiments, in the case of without departing substantially from present invention spirit and essence thereof, those of ordinary skill in the art can be according to this Bright make various corresponding change and deformation, but these change accordingly and deformation all should belong to appended claims of the invention Protection domain.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general Calculating device realize, they can concentrate on single calculating device, or be distributed in multiple calculating device and formed Network on, alternatively, they can with calculate the executable program code of device realize, it is thus possible to by they store Performed by calculating device in the storage device, and in some cases, can perform with the order being different from herein shown The step gone out or describe, or they are fabricated to respectively each integrated circuit modules, or by the multiple modules in them or Step is fabricated to single integrated circuit module and realizes.So, the present invention is not restricted to the combination of any specific hardware and software.

Claims (11)

1. a looped network tunnel configuration method based on overlapping trees, it is characterised in that
The overlapping trees of one net loaded multiple multipoint-to-point MP2P of physical rings, described overlapping trees carrying from ring or many Individual node is to the business of same destination node;
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with described work tunnel Reverse closed protective tunnel accordingly, road, described configuration work tunnel is: along described ring clockwise and/or counterclockwise from The adjacent node of described lower link point, to described lower link point, sets up work tunnel;Described configuration closed protective tunnel is: along institute The rightabout stating work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point.
2. a ring net protection method based on overlapping trees, it is characterised in that the net loaded multiple multipoint-to-points of physical rings The overlapping trees of MP2P, described overlapping trees carrying from ring one or more nodes to the business of same destination node;Institute The method of stating includes:
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with described work tunnel Reverse closed protective tunnel accordingly, road, described configuration work tunnel is: along described ring clockwise and/or counterclockwise from The adjacent node of described lower link point, to described lower link point, sets up work tunnel;Described configuration closed protective tunnel is: along institute The rightabout stating work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point;
Link State between each nodal test and adjacent node on ring, when detecting that Link State changes, the state that sends changes Notification packet is to other nodes on ring;
When described Link State changes into link or one malfunctions, the business being sent to trouble point that work tunnel transmits When being sent to fault phase neighbors, the working tunnel label of described business is exchanged for protecting tunnel mark by this fault phase neighbors Signing, press-in transmits on closed protective tunnel;When protecting the business transmitted on tunnel to be sent to another fault phase neighbors, should The protection tunnel label of described business is exchanged for again working tunnel label by fault phase neighbors, is again pressed in work tunnel Transmit, until described business arrives its ring egress;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
3. method as claimed in claim 2, it is characterised in that described method also includes:
When described Link State changes into link or node failure disappears, fault phase neighbors will be switched to described closed protective The business transmitted on tunnel is restored in described work tunnel.
4. method as claimed in claim 2 or claim 3, it is characterised in that described method also includes:
When described Link State changes into link or one malfunctions, the state of this node is changed into by fault phase neighbors Switching Switch state, the state of this node is changed into break-through Pass through state by the node outside fault phase neighbors;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by Switch state changes into idle Idle state;Node outside fault phase neighbors by the state of this node by Pass through state Change into Idle state.
5. method as claimed in claim 2 or claim 3, it is characterised in that described method also includes:
Service message uses press-in PUSH looped network tunnel label stacked manner when upper ring forwards, i.e. according to described lower link point Traffic direction with work tunnel is pressed into the tunnel label of PUSH overlapping trees, forwards along looped network, described lower link point Eject POP tunnel label and carry out ring under business.
6. method as claimed in claim 4, it is characterised in that
The business of described overlapping trees carrying, including: the VPN (virtual private network) vpn service of single layer label, the label of multilayer labels Switching path LSP service, without the IP of label or Ethernet Eth business.
7. method as claimed in claim 6, it is characterised in that
Described work tunnel supports that PHP is ejected in the last two jump.
8. a looped network tunnel configuration system based on overlapping trees, it is characterised in that the net loaded multiple multiple spots of physical rings To some MP2P overlapping trees, described overlapping trees carrying from ring one or more nodes to the industry of same destination node Business;Including: path configuration module,
Described path configuration module is used for, and on ring, for the purpose of the lower link point of business, node configures work based on overlapping trees Tunnel, and reversely closed protective tunnel corresponding with described work tunnel, described configuration work tunnel is: suitable along described ring Hour hands and/or counter clockwise direction to described lower link point, set up work tunnel from the adjacent node of described lower link point;Described join Putting closed protective tunnel is: the rightabout along described work tunnel is set up from described lower link point to the envelope of described lower link point Close protection tunnel.
9. a Ring protection system based on overlapping trees, it is characterised in that the net loaded multiple multipoint-to-points of physical rings The overlapping trees of MP2P, described overlapping trees carrying from ring one or more nodes to the business of same destination node;Institute The system of stating includes:
Path configuration module, on ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees Road, and reversely closed protective tunnel corresponding with described work tunnel, described configuration work tunnel is: along the up time of described ring Pin and/or counter clockwise direction to described lower link point, set up work tunnel from the adjacent node of described lower link point;Described configuration Closed protective tunnel is: the rightabout along described work tunnel is set up from described lower link point to the closing of described lower link point Protection tunnel;
State detection module, for detecting the Link State between this node and adjacent node;
State advertisement module, the Link State between detection and adjacent node, when detecting that Link State changes, send shape State changes notification packet to other nodes on ring;
Business handover module, for changing notification packet according to the described state received, when knowing that described Link State changes When becoming link or one malfunctions for normal condition, the business being sent to trouble point that work tunnel transmits is sent to fault During adjacent node, the working tunnel label of described business is exchanged for protecting tunnel label, press-in to close by this fault phase neighbors Protection transmits on tunnel;When protecting the business transmitted on tunnel to be sent to another fault phase neighbors, this fault adjacent segments The protection tunnel label of described business is exchanged for again working tunnel label by point, is again pressed in work tunnel transmission, until Described business arrives its ring egress;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
10. system as claimed in claim 9, it is characterised in that
Described business handover module is additionally operable to, and changes notification packet according to the described state received, when knowing described link shape When state changes into link or node failure disappearance, then fault phase neighbors will be switched on described closed protective tunnel the industry transmitted Business is restored in described work tunnel.
11. systems as claimed in claim 10, it is characterised in that
Described business handover module is additionally operable to, and when described Link State changes into link or one malfunctions, fault is adjacent The state of this node is changed into Switch state by node, and the state of this node is changed into by the node outside fault phase neighbors Pass through state;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by Switch state changes into Idle state;The state of this node is changed by the node outside fault phase neighbors by Pass through state For Idle state.
CN201110198332.1A 2011-07-15 2011-07-15 Looped network tunnel configuration method based on overlapping trees, ring network protection method and system Active CN102882780B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110198332.1A CN102882780B (en) 2011-07-15 2011-07-15 Looped network tunnel configuration method based on overlapping trees, ring network protection method and system
PCT/CN2012/077223 WO2013010422A1 (en) 2011-07-15 2012-06-20 Share-path-based ring network tunnel configuration method, ring network protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110198332.1A CN102882780B (en) 2011-07-15 2011-07-15 Looped network tunnel configuration method based on overlapping trees, ring network protection method and system

Publications (2)

Publication Number Publication Date
CN102882780A CN102882780A (en) 2013-01-16
CN102882780B true CN102882780B (en) 2016-09-28

Family

ID=47483931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110198332.1A Active CN102882780B (en) 2011-07-15 2011-07-15 Looped network tunnel configuration method based on overlapping trees, ring network protection method and system

Country Status (2)

Country Link
CN (1) CN102882780B (en)
WO (1) WO2013010422A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973536A (en) * 2013-02-05 2014-08-06 中国移动通信集团公司 Device and method for protection of point-to-multipoint looped network
CN104660501A (en) * 2013-11-25 2015-05-27 中兴通讯股份有限公司 Shared protection method, device and system
CN105099748A (en) * 2014-05-23 2015-11-25 中兴通讯股份有限公司 Method and system for migrating business tunnel
CN105207871B (en) * 2014-06-25 2020-07-31 南京中兴软件有限责任公司 Double-cut ring network protection method and device
US10218611B2 (en) 2014-06-30 2019-02-26 Juniper Networks, Inc. Label distribution protocol (LDP) signaled multi-protocol label switching rings
US9692693B2 (en) * 2014-06-30 2017-06-27 Juniper Networks, Inc. Bandwidth control for ring-based multi-protocol label switched paths
US9729455B2 (en) * 2014-06-30 2017-08-08 Juniper Networks, Inc. Multi-protocol label switching rings
CN105591898A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Tunnel protection method and tunnel protection device based on shared tunnels
US11233748B1 (en) 2018-08-30 2022-01-25 Juniper Networks, Inc. Bandwidth management for resource reservation label switched path of a ring network
CN109462500B (en) * 2018-10-26 2020-09-18 江西山水光电科技股份有限公司 Packet transport network PTN equipment looped network protection method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316212A (en) * 2008-07-07 2008-12-03 华为技术有限公司 Looped network failure processing method, looped network and operator backbone equipment
CN101431459A (en) * 2008-12-17 2009-05-13 烽火通信科技股份有限公司 Looped network protection method for transmitting multiprotocol label switching network
US7545735B1 (en) * 2003-03-11 2009-06-09 Atrica Israel Ltd. Scalable protection mechanism for hierarchical multicast service in ring based networks
CN101877665A (en) * 2009-04-29 2010-11-03 华为技术有限公司 Ring network protecting method, network node and ring network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6622258B1 (en) * 2000-04-10 2003-09-16 Appian Communications, Inc. Data protection in a ring network
US8204374B2 (en) * 2004-12-10 2012-06-19 Ciena Corporation Reconfigurable multichannel (WDM) optical ring network with optical shared protection
CN102014011A (en) * 2009-09-04 2011-04-13 中兴通讯股份有限公司 Method and system for protecting looped network
CN102035712B (en) * 2009-09-29 2013-12-18 华为技术有限公司 Multiprotocol label exchanged ring network protection method, device and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7545735B1 (en) * 2003-03-11 2009-06-09 Atrica Israel Ltd. Scalable protection mechanism for hierarchical multicast service in ring based networks
CN101316212A (en) * 2008-07-07 2008-12-03 华为技术有限公司 Looped network failure processing method, looped network and operator backbone equipment
CN101431459A (en) * 2008-12-17 2009-05-13 烽火通信科技股份有限公司 Looped network protection method for transmitting multiprotocol label switching network
CN101877665A (en) * 2009-04-29 2010-11-03 华为技术有限公司 Ring network protecting method, network node and ring network

Also Published As

Publication number Publication date
WO2013010422A1 (en) 2013-01-24
CN102882780A (en) 2013-01-16

Similar Documents

Publication Publication Date Title
CN102882780B (en) Looped network tunnel configuration method based on overlapping trees, ring network protection method and system
CN103312613B (en) Service message retransmission method and device
CN102025646B (en) Link switching method and device thereof
CN106487675A (en) For the outlet protection in EVPN with BUM flow during link failure
CN100359860C (en) Multiprotocol label switching network protection switching method
CN101710877A (en) Method, device and system for processing traffic flow based on pseudowire
CN102891787B (en) Looped network tunnel configuration method, business switch method and system based on overlapping trees
CN102035714B (en) A kind of crossing tangent ring networks guard method and system
CN101931586B (en) Method and system for rapidly rerouting MPLS VPN (Multi-Protocol Label Switching Virtual Private Network)
WO2011021179A1 (en) Technique for dual homing interconnection between communication networks
CN101783743B (en) Business protection method and switching node
CN102820990A (en) Method and device for switching service protection
Hariyawan Comparison analysis of recovery mechanism at MPLS network
CN102857316B (en) A kind of method and system realizing source looped network protection
CN108243114A (en) A kind of method to E-Packet, equipment and system
WO2013049981A1 (en) Hybrid ring network protection method and system based on shared path
CN104468208A (en) Detection and recovery method and device for communication faults
WO2015154603A1 (en) Tunnel protecting method and device based on shared tunnel
WO2008132203A2 (en) Recovering from a failure in a communications network
CN104702431B (en) A kind of method and device of Virtual Private Network double break protection
CN102611610A (en) Method and system for centralized management of a plurality of tunnels with same path
CN102185773B (en) Multi-protocol label switching transport profile ring protection switching method and node
CN108023800A (en) A kind of guard method of LTE bearer networks and device
WO2016090815A1 (en) Switching control method and device in deploying high-capacity service
CN102916842A (en) Method for implementing PTN (Packet Transport Network) equipment double-returning protection by overlaying various protection modes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201223

Address after: 224006 room 1306, yanchuang building, Yandu District, Yancheng City, Jiangsu Province (d)

Patentee after: Yancheng Hengmao Landscaping Co.,Ltd.

Address before: 518057 Ministry of justice, Zhongxing building, South Science and technology road, Nanshan District hi tech Industrial Park, Shenzhen, Guangdong

Patentee before: ZTE Corp.